Podcast
Questions and Answers
What is the first step in building an IT Security Plan?
What is the first step in building an IT Security Plan?
- Security Audit
- Risk Assessment (correct)
- Implementation Plan
- Developing a Security Policy
What does the Risk Assessment involve?
What does the Risk Assessment involve?
- Implementation of security procedures
- Creating a Security Organization
- Inventory of information assets and estimation of their value (correct)
- Conducting a security audit
What is the purpose of developing a Security Policy?
What is the purpose of developing a Security Policy?
- Implementing security procedures
- Creating a Security Organization
- Prioritizing information risks and setting acceptable targets (correct)
- Conducting a security audit
What should the Security Policy prioritize?
What should the Security Policy prioritize?
What is the first step in developing a security plan?
What is the first step in developing a security plan?
What is the primary purpose of an authorization management system?
What is the primary purpose of an authorization management system?
What is the main focus of a MIS audit?
What is the main focus of a MIS audit?
What does an access control system determine?
What does an access control system determine?
What is the scope of task for a security organization team?
What is the scope of task for a security organization team?
What is the purpose of performing an MIS audit?
What is the purpose of performing an MIS audit?
What is the main focus of an authorization management system?
What is the main focus of an authorization management system?
What does an authentication procedure include?
What does an authentication procedure include?
What is the purpose of an access control system?
What is the purpose of an access control system?
What is the action step to achieve the security plan goals?
What is the action step to achieve the security plan goals?